Towerwall's InfoSec Blog

Content Type

See all
Join Towerwall & SnoopWall for a timely webinar on: Breach Prevention & Near-Term ROI

Join Towerwall & SnoopWall for a timely webinar on: Breach Prevention & Near-Term ROI

identification , SOX , Webinar , auditing , vulnerability , Near-Term ROI , PCI , malware , Breach Prevention , HIPAA , Compliance & Privacy , Compliance , SnoopWall , Zero-day malware , patch management , Gary Miliefsky , cannabis , Enterprise

Michelle Drolet

Towerwall & SnoopWall Complimentary Webinar: Breach Prevention & Near-Term ROI Tuesday, July 26 11:00am – 12:00pm EST

Information Security Summit 2016 Review: Ransomware, Application Vulnerability, Hacking as an Industry Lead our Discussion

spear phishing , BYOD , Government Compliance Regulations , Information Security Summit 2016 , malware , ransomware , Compliance & Privacy , GRC , Compliance , cannabis , Enterprise

Michelle Drolet

Thanks to all who attended and sponsored our 2016 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing infosec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz16 Here are some of the topics discussed at this year's summit:

LinkedIn Data Breach Still Causing Problems

Mark Zuckerberg’ , Linkedin , passwords , Hack , SHA1 , haveibeenpwned.com , cannabis , Enterprise

Michelle Drolet

Failing to take basic security precautions with website passwords puts your data at risk Do you remember back in 2012 when LinkedIn was hacked? Around 6.5 million user passwords were posted on a Russian blog. There was a mandatory password reset for affected users, and LinkedIn released a statement advising people to enable two-step verification and use stronger passwords. Four years later, and the passwords of 117 million accounts were compromised. Worryingly, this came to light only when afalse

8 Tips to Secure Those IoT Devices

smart TV , BYOD , password , smart fridge , UPnP , Wi-Fi , Internet of Things , IoT , cannabis , Enterprise

Michelle Drolet

Make sure the Internet of Things isn’t a route for hackers to get into your home or workplace As more and more Internet-connected devices find their way into our homes and businesses, it’s important to remember that they represent a security risk. The Internet of Things (IoT) is growing rapidly, and in the rush for convenience, our privacy and safety is often an afterthought. Leaving them unsecured is the digital equivalent of leaving the back door unlocked. There are 5.5 million new thingsfalse

3 Ways to Protect Data and Control Access to It

Center for Internet Security (CIS) , private sector , Wireless Access Control , human error encryption , public sector , authentication , cannabis , cybersecurity , Enterprise

Michelle Drolet

Your company's data is its crown jewels, and you must protect it all times. CIS Controls 13, 14 and 15 will help you. Earlier we delved into disaster recovery and network security. Now it’s time to take a look at Critical Security Controls 13, 14 and 15, which cover data protection and access control. The Critical Security Controls are best practices devised by the Center for Internet Security (CIS), a nonprofit dedicated to improving cybersecurity in the public and private sectors. A company’sfalse

Join Towerwall at these Upcoming InfoSec Events

Join Towerwall at these Upcoming InfoSec Events

ISACA , Conference , Information Security Summit 2016 , Boston , Social Engineering , Phishing , Information Security , Security BSides Boston 2016 , malware , Information Security Summit , Events , Compliance , Massachusetts , cannabis , Enterprise

Michelle Drolet

We will be attending, sponsoring and hosting the following InfoSec events this Spring / Summer. Join us!

10 Things I Know About... Ransomware Protection

passwords , Phishing , Whitelist , ransomware , Ransomware Protection , Patch , 10 Things I Know , cannabis , Enterprise

Michelle Drolet

10. Backup files every night. If you can access yesterday's files, then there is no need to pay to unlock them today.

7 Potential Security Concerns for Wearables

Wearables , third party applications , password protection , BYOD , Bluetooth , Wireless , NFC , Compliance , cannabis , Enterprise

Michelle Drolet

Is your organization safe from all these connected devices? Wearables are rapidly invading the workplace in much the same way that smartphones did. Fitness trackers, smartwatches, head-mounted displays and other new form factors are beginning to capture the public imagination. Sales of wearable electronic devices topped 232 million in 2015, and Gartner forecasts they’ll rise 18.4% this year, when another 274.6 million devices are sold.

Bugs for cash: Bounty hunters in the new wild west of security

Open Web Application Security Project (OWASP) , software bugs , Pwn2Own , Bugcrowd , DROWN , OWASP , white market , cannabis , Enterprise

Michelle Drolet

How security researchers and programmers hunt software bugs for cash rewards The business of bug hunting is a potentially lucrative one for both seasoned security researchers and amateurs with an interest in hacking. It’s an area that’s gaining legitimacy thanks to official bug bounty programs and hacking contests, but there’s still a seedy underbelly that unscrupulous bounty hunters can take advantage of if they successfully identify a vulnerability. The average cost of a data breach is $3.8false

Towerwall Information Security Alert Vol 14.07 - Watch out for April Fools scamming on Friday

Google , Fractional Chief Information Security Officer (CIS , Conficker , Phishing , Virus , ransomware , Amazon , scammers , April Fools , Starbucks , cannabis , Enterprise

Michelle Drolet

Watch out for April Fools scamming on Friday by Kevin Frey Annually, businesses and organizations often put up jokes or pranks for April Fools’ Day. Google, Starbucks, Amazon, etc. are frequent participants. E.g. Last year, Amazon revamped their site to look their old, original 1999 version... and Google (known for multiples) turned its "Maps" app into the classic arcade game "Pac-Man." However, it is important to remember to think twice before clicking on things you receive on email or see onfalse